Open Menu
AllLocalCommunitiesAbout
lotide
AllLocalCommunitiesAbout
Login

Leaked Documents Show What Phones Secretive Tech ‘Graykey’ Can Unlock

⁨133⁩ ⁨likes⁩

Submitted ⁨⁨5⁩ ⁨months⁩ ago⁩ by ⁨misk@sopuli.xyz⁩ to ⁨technology@lemmy.world⁩

https://www.404media.co/leaked-documents-show-what-phones-secretive-tech-graykey-can-unlock-2/

source

Comments

Sort:hotnewtop
  • TechnoFish@lemm.ee ⁨5⁩ ⁨months⁩ ago

    One good thing about windows phones was that hardly anyone would have been insane enough to spend resources to develop a forensic tool for it.

    source
    • IDKWhatUsernametoPutHereLolol@lemmy.dbzer0.com ⁨5⁩ ⁨months⁩ ago

      Lol, did you see what windows computers do? They literally upload your key to microsoft. Like they aren’t event hiding the fact. If you don’t create a microsoft account to allow for the upload, then they just store the key unencrypted and its effectively like no encryption.

      source
      • lud@lemm.ee ⁨5⁩ ⁨months⁩ ago

        That’s because people are stupid enough to never write down their keys and it’s better to have somewhat worse encryption compared to no encryption.

        In an enterprise the recovery keys are most often stored in AD or Entra.

        source
  • just_another_person@lemmy.world ⁨5⁩ ⁨months⁩ ago

    Anyone have the linked docs from the article? Looks like archive didn’t get them in time.

    source
    • GlenRambo@jlai.lu ⁨5⁩ ⁨months⁩ ago

      Its linked in other commenters post

      source
  • mac@lemm.ee ⁨5⁩ ⁨months⁩ ago

    Has there been any information about how long physical access is needed for these attack methods to extract data?

    I’ve got mine set at 8 hours, in graphene’s mastodon thread, they say 10 minutes is best for highest levels of security. The short time frame given in that thread makes me wonder if these exploits give instant access to data.

    source